Attacks and Mitigation Techniques on the Direct D2D Communication Sublayer of 5G Networks

preview_player
Показать описание
The new 5G network specifications have created the potential for a greatly expanded 5G cellular network that will support network virtualization, gigabit data speeds, Ultra-Reliable Low-Latency connections, expanded device-to-device communication and an expansion of IoT devices. New use cases are being researched for device-to-device communications (D2D) that include the areas of medical devices, automotive and IoT. The new uses cases demand high availability and integrity with low latency, this will require new technologies to achieve the new specifications and maintain the security of the device-to-device communications. 5G D2D communications will be exposed to same threat models of current D2D communications, Man-in-the-Middle, Eavesdropping, Replay and Denial-of-Service attacks. The traditional mitigation techniques need to be replaced with faster more secure mitigation techniques that meet the new standards for 5G D2D communications. This paper combines researched technologies of High-Speed Signature, Frequency Hopping, and Twofish Encryption with a new technology, Antenna Addressing, to create a new HAFE communication architecture. Each 5G device will have a minimum of 4 antenna arrays, An algorithm is used to determine which array will be the active antenna for the communication transmission. The use of an Antenna Address for each antenna array will give each device the ability to securely transmit the active antenna array address to the other device in the D2D communication. The devices will ignore any transmissions that are not emanating from the active antenna array address. HAFE has the potential to increase security for device-to-device communications while meeting the new demands of 5G device-to-device communications.
Рекомендации по теме
Комментарии
Автор

can you provide your full research paper. i am quite interested on it.

bashantajung